Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-23814

Publication date:
17/12/2021
This affects versions of the package unisharp/laravel-filemanager before 2.6.2. The upload() function does not sufficiently validate the file type when uploading.<br /> <br /> An attacker may be able to reproduce the following steps:<br /> <br /> 1. Install a package with a web Laravel application.<br /> 2. Navigate to the Upload window<br /> 3. Upload an image file, then capture the request<br /> 4. Edit the request contents with a malicious file (webshell)<br /> 5. Enter the path of file uploaded on URL - Remote Code Execution<br /> <br /> <br /> **Note:** Prevention for bad extensions can be done by using a whitelist in the config file(lfm.php). Corresponding document can be found in [here](https://unisharp.github.io/laravel-filemanager/configfolder-categories).
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2021-23450

Publication date:
17/12/2021
All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2023

CVE-2021-41496

Publication date:
17/12/2021
Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2024

CVE-2021-23803

Publication date:
17/12/2021
This affects the package latte/latte before 2.10.6. There is a way to bypass allowFunctions that will affect the security of the application. When the template is set to allow/disallow the use of certain functions, adding control characters (x00-x08) after the function will bypass these restrictions.
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2021

CVE-2021-23797

Publication date:
17/12/2021
All versions of package http-server-node are vulnerable to Directory Traversal via use of --path-as-is.
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2021

CVE-2021-41495

Publication date:
17/12/2021
Null Pointer Dereference vulnerability exists in numpy.sort in NumPy &amp;lt and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays. NOTE: While correct that validation is missing, an error can only occur due to an exhaustion of memory. If the user can exhaust memory, they are already privileged. Further, it should be practically impossible to construct an attack which can target the memory exhaustion to occur at exactly this place
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2024

CVE-2021-34141

Publication date:
17/12/2021
An incomplete string comparison in the numpy.core component in NumPy before 1.22.0 allows attackers to trigger slightly incorrect copying by constructing specific string objects. NOTE: the vendor states that this reported code behavior is "completely harmless."
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2023

CVE-2021-43840

Publication date:
17/12/2021
message_bus is a messaging bus for Ruby processes and web clients. In versions prior to 3.3.7 users who deployed message bus with diagnostics features enabled (default off) are vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for your web application as the number of steps up the directories is not bounded. For deployments which uses a proxy, the impact varies. For example, If a request goes through a proxy like Nginx with `merge_slashes` enabled, the number of steps up the directories that can be read is limited to 3 levels. This issue has been patched in version 3.3.7. Users unable to upgrade should ensure that MessageBus::Diagnostics is disabled.
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2021

CVE-2021-43838

Publication date:
17/12/2021
jsx-slack is a library for building JSON objects for Slack Block Kit surfaces from JSX. In versions prior to 4.5.1 users are vulnerable to a regular expression denial-of-service (ReDoS) attack. If attacker can put a lot of JSX elements into `` tag, an internal regular expression for escaping characters may consume an excessive amount of computing resources. jsx-slack v4.5.1 has patched to a regex for escaping blockquote characters. Users are advised to upgrade as soon as possible.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2023

CVE-2021-33430

Publication date:
17/12/2021
A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2024

CVE-2021-38883

Publication date:
17/12/2021
IBM Business Automation Workflow 18.0, 19.0, 20,0 and 21.0 and IBM Business Process Manager 8.5 and 8.6 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 209165.
Severity CVSS v4.0: Pending analysis
Last modification:
21/12/2021

CVE-2021-40853

Publication date:
17/12/2021
TCMAN GIM does not perform an authorization check when trying to access determined resources. A remote attacker could exploit this vulnerability to access URL that require privileges without having them. The exploitation of this vulnerability might allow a remote attacker to obtain sensible information.
Severity CVSS v4.0: Pending analysis
Last modification:
23/11/2023